Featured Slideshow

In a Dallas courtroom on Thursday, writer and activist Barrett Brown was sentenced to 63 months in prison and was ordered to pay a little more than $890,000 in restitution and fines, according to reports.

Upcoming Live Events

Be sure to stay tuned for breaking news on our 2015 conference and expo, which promises to deliver even more innovative programming and an enhanced showcase of the latest cyber security solutions you must see.

Hackers eye new Java exploits that impact users who haven't upgraded

Attackers are always on the hunt for the most reliable exploits to add to crimeware kits – and it appears they currently are eyeing a number of "critical" bugs in Java that remain unpatched for many users.

According to researchers, hackers have swapped out one such exploit from Neutrino, a popular underground exploit kit, in search of a more effective alternative.

Timo Hirvonen, a senior analyst at security firm F-Secure, discovered that since Monday, saboteurs had been taking advantage of CVE-2013-2463, which was patched in June for Java 7 but still exists in Java 6 because that platform is no longer supported unless customers have a special contract with Oracle.

But now, it appears the exploit for this vulnerability has been removed from Neutrino, Hirvonen told SCMagazine.com on Thursday. Attackers are experimenting with similar vulnerabilities that have been patched in Java 7, but not version 6.

In Oracle's June critical patch update advisory, eight flaws in Java Runtime Environment's 2D sub-component, which is used to draw two-dimensional graphics, were assigned the top score of 10 out of 10 on Oracle's implementation of the Common Vulnerability Scoring System (CVSS).

So far, at least four of the bugs (CVE-2013-2463, 2471, 2465, and 2473) in the 2D sub-component of Java have been divulged in detail via proof-of-concept code being published online. The vulnerabilities leave Java users open to remote attack by attackers who do not require authentication, according to Oracle advisories.

Hirvonen said the four flaws are “highly similar,” but slight variances may have accounted for CVE-2013-2463 being nixed from the Neutrino exploit kit.

“It's actually very difficult to figure out how [they are] different exploits,” Hirvonen said of the disclosed bugs. “It's highly similar. I'm guessing what the cyber criminals will do is test which one of these exploits is the most reliable."

A researcher known as Kafeine said in a blog post that the that sellers of the exploit kit had already switched to another of the critical Java vulnerabilities, CVE-2013-2465, to determine if it was more effective in attacks.

"The reason is…that CVE-2013-2463 was not working for them," the researcher wrote. "[I]n fact no infection [occurred] with it [in the] past two days."

Half of Java users still are running version 6, cloud security company Qualys has found.

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.